default search action
2nd ICSAI 2014: Shanghai, China
- 2nd International Conference on Systems and Informatics, ICSAI 2014, 15-17 November 2014, Wistaria Hotel, Shanghai, China. IEEE 2014
- Teng Lv, Chuanjiang Li, Yanchao Sun, Guangfu Ma, Junzi Xiao:
A guidance law design with terminal impact angle constraint based on nonlinear generalized predictive control. 1-5 - Lei Zhao, Ben-Wen Li:
Analyzing robust D-stability and D-stabilization for discrete descriptor systems subjected to norm-bounded uncertainties in the coefficient matrix. 6-11 - Jiazhen Zhang, Guangming Zhang, Meilei, Deming Wang:
Axial flux Doubly Salient Motor speed control based on fuzzy-PID control. 12-17 - Yanjun Shen, Qinghua Jiang, Peng Miao:
Continuous but non-smooth adaptive observer of a class of nonlinear systems. 18-22 - Tongtong Zhang, Weimin Zhang:
Control on output peak current of motors in robots. 23-27 - Magdi Sadek Mahmoud:
H2and H∞control of discrete systems with time scales. 28-32 - Xiwei Liu, Ping Li, Yuan Xu, Ying Liu:
Quasi-synchronization for delayed systems with parameter mismatches via aperiodically intermittent control. 33-38 - Junqiao Qiu, Weibing Li, Yunong Zhang, Senbo Fu, Hongzhou Tan:
Two numerical algorithms and numerical experiments for efficiently solving inequality-and-bound constrained QP. 39-44 - Dongsheng Guo, Xiaogang Yan, Long Jin, Hongzhou Tan, Yunong Zhang:
ZE in iZ1eD1 manner for MKE redundancy resolution at velocity and acceleration levels. 45-50 - Tri-Vien Vu, Chih-Keng Chen:
A control oriented model and application for control system design of a series hydraulic hybrid vehicle. 51-56 - Yongtao Li, Xiangju Qu, Wenqian Tan:
A phase compensator to prevent pilot induced oscillations by actuator rate limiting. 57-62 - Chunyang Gao, Zhenyu Zhao:
An optimal allocation approach of cooperative search capability based on game theory. 63-67 - Yiqiao Liang, Qiguo Han:
The application of asymptotic tracking and disturbance rejection in voltage source converter controller design. 68-73 - Wenhui Zhao, ZhiXin Qin:
Routing algorithm for wireless sensor networks based on resistance distance. 74-78 - Zhiguo Dai, Chong Kang:
Geomagnetic field aided inertial navigation using the SITAN algorithm. 79-83 - Mingqing Hu, Xiaoquan Han, Zebing Feng, Yi Zhou, Weihu Zhou, Lujun Bai, Bing Li:
Improved PID algorithms with application to excimer laser temperature control. 84-88 - Wei Long, Hong Sun, Xiao Li, Bo Jiang, Yang Liu:
The CSNS RCS remote control system based on EPICS. 89-93 - Baodong Gao, Jianping Wang, Fan Cheng, Guo Zhang, Xiaohong Yang, Junhui Liu:
The simulation of direct torque control fuzzy control system based on Labview and Matlab. 94-98 - Thi Thu Giang Hoang, Ren Feng Zheng, Xiao-Hong Wang, Lian-Fang Tian:
Using fractional-order PIλDμcontroller to control three-phase parallel pulses width modulation (PWM) rectifier. 99-103 - Rong Hu, Zhaohui Li, Dongmei Li, Hui Ding:
A DIBR method based on foreground extraction and holes corrosion. 104-108 - Ho-Jin Jang, Seung-Hae Baek, Soon-Yong Park:
Curved lane detection using robust feature extraction. 109-112 - Yaqin Zhao, Guizhong Tang:
Fire video recognition based on flame and smoke characteristics. 113-118 - Qing Xie, Lin Ge, Zhenyi Wang:
Design of the virtual reality roam system for ancient city. 119-123 - Lanxin Hu, YuLong Ying, Jingchao Li:
A fuzzy logic controller application for marine power plants. 124-131 - Li-qun Shang, Jian-dang Lv:
A new approach for identification of the fault type on transmission lines. 132-136 - Wei Huang, Yajuan Guo, Ling Zhuang, Qin Mei, Xiaohai Xu:
Applying of network security situation awareness in smart substations. 137-142 - Taifeng Kang, Ruipeng Zhang, Fengqing Zhao, Aoyang Han, Jianying Li, Yuanlong Liu:
How could advanced distribution automation have prevented the 2006 U.S. Northwest Queen blackout. 143-147 - Yury S. Borovikov, Alexandr S. Gusev, Almaz O. Sulaymanov, Ruslan A. Ufa:
Hybrid real-time simulator of power system for advanced simulation of the FACTS and HVDC system based on voltage source converter. 148-152 - Yury S. Borovikov, Almaz O. Sulaymanov, Alexandr S. Gusev, Mikhail V. Andreev:
Simulation of automatic exciting regulators of synchronous generators in hybrid real-time power system simulator. 153-158 - Weijia Li, Yuzhuo Fu, Ting Liu, Pengzhi Chu, Jiafang Wang, Hui Chen:
Battery equalization based on state of charge. 159-163 - Xiaofei Gao, Qin Zhou:
A low consumption DSP based power analyzer. 164-168 - Hussein Al-bayaty, Marcel Ambroze, Mohammed Zaki Ahmed:
Taking advantage of the harmonics at the load side using passive filters. 169-174 - Ying Hong Yang, Lichun Wang:
The online detection of faulty insulator using fast Fourier transformation. 175-179 - Guangxing Bai, Yanwu Ding, Mehmet Bayram Yildirim, Yan-Hong Ding:
Short-term prediction models for wind speed and wind power. 180-185 - Jianping Zhang, Zhenyu Gao, Yuliang Ren, Xinhui Du, Xiaohai Yin:
A economic operation optimization for microgrid with battery storage and load transfer. 186-191 - Bradley Rideout, Tugcan Sahin, Daniel Shereck:
Implementation of a virtual power plant: The integrated load management system. 192-196 - Ke Sun, Weihui Shao, Zhiyu Xu, Weisheng Xu:
Islanding partition of the distribution system with distributed generations based on Memetic algorithm. 197-201 - Tugcan Sahin, Daniel Shereck:
Renewable energy sources in a transactive energy market. 202-208 - Huihui Lu, Yuxiang Yuan:
Substation equipment temperature monitoring system design based on self-powered wireless temperature sensors. 209-214 - Liqun Shang, Senfeng Zhang:
A new simulation method of switching overvoltage on shunt capacitors. 215-219 - Kangli Chen:
A new robust character segmentation method. 220-224 - Mohammad S. Khorsheed, Samir Ouis:
HMM-based recognition engine using a novel approach for statistical feature extraction. 225-229 - Kangli Chen, Wancheng Ge:
Pedestrian tracking algorithm based on Kalman filter and partial mean-shift tracking. 230-235 - Donat Ivanov, Igor A. Kalyaev, Sergey Kapustyan:
Method of circles for solving formation task in a group of quadrotor UAVs. 236-240 - Dharmendra Sharma, Fariba Shadabi:
Multi-agents based data mining for intelligent decision support systems. 241-245 - Andrew Schumann:
Non-linear permutation groups on Physarum polycephalum. 246-251 - Eugénio C. Oliveira, Henrique Lopes Cardoso, Joana Urbano, Ana Paula Rocha:
Trustworthy agents for B2B operations under Normative environment. 252-257 - Wenqian Tan, Yu Wu, Xiangju Qu, Alexander V. Efremov:
A method for predicting aircraft flying qualities using neural networks pilot model. 258-263 - Rui Qiao, Heng He, Jinguang Gu, Maofu Liu, Yajun Feng, Xiaolei Zhong:
An emotion understanding system. 264-270 - Shuo Xiong, Hiroyuki Iida:
Attractiveness of real time strategy games. 271-276 - Jun Jiao, Li Sun, Wen Kong, Youhua Zhang, Yan Qiao, Chenchen Yuan:
A sliding parameter estimation method based on UKF for agricultural tracked robot. 277-282 - Peng Hu, Jianjing Shen, Linbo Tao:
Scenario-driven composition of context-aware simulation components. 283-287 - Ji-Wook Jeong, Jeong-Won Lee, Sung Hee Park, Woo Jin Hyung, Sooyeul Lee:
Vessel navigator for surgical rehearsal system using topological map: An application to gastrectomy. 288-292 - Jianhua Cai, Qingchun Hu:
Analysis for cloud testing of web application. 293-297 - Javeria Khizar, Sarmad Sadik:
Cloud based semantic middleware for data storage on peer to peer network. 298-303 - Niansheng Chen, Xiaoping Fang, Xin Wang:
A cloud computing resource scheduling scheme based on estimation of distribution algorithm. 304-308 - Tayyiba Naeem, Sarmad Sadik:
Optimizing performance and fault tolerance through cloud based adaptive replication for mobile applications. 309-314 - Wafa S. Al-Sharafat:
Proposed anticipating learning classifier system for cloud intrusion detection (ALCS-CID). 315-318 - Xiaxin Li, Shutao Sun:
MP3 audio parallel decoding based on Libmad library. 319-323 - Xiaojie Xu, Lisheng Wang:
Task assignments based on shared memory multi-core communication. 324-328 - Bo Liu, Yunhong Yan, Lizhang Peng, Yunlong Cheng, Yan Jin:
A hard real-time scheduling algorithm based on elastic model. 320-333 - Xiaoyang Li, Yu Liu, Chen Gong, Dake Liu:
Recognition of access patterns for DSP kernel codes. 334-338 - Yang Bo, Hao Zhong-kao:
Two speed processor system high accuracy digital to synchro converter. 339-343 - Jihong Liu, Zhenjie Zhao:
A method of categorization and organization for 3D model-based design knowledge. 344-349 - Cheng Jing, Guo-jun Zhao:
Design and implementation of an elevator wireless adjustment system. 350-355 - Yuesheng Wang, Hao Qian, Dawei Zhen:
Emulsifier fault diagnosis based on back propagation neural network optimized by particle swarm optimization. 356-360 - Zhao Du, Yeming Tang, Ting Liu, Qifeng Liu:
ConferenceOne: A cloud-based collaborative conference service system. 361-365 - Xinguang Li, Jiahua Chen, Minfeng Yao, Dongxiong Shen, Fan Lin:
English sentence pronunciation evaluation using rhythm and intonation. 366-371 - Changxi Li, Yan Zhou, Xu-hui Lan, Ge Guo, Chong Wu:
A new tracking algorithm for hypersonic targets. 372-377 - Sajid Baloch, Fahad Al Ghazali, N. Mir, Fasih Ud Din Farrukh, H. Ismail, Muhammad Yasir Qadri:
Hardware realization of locally normalized cross correlation algorithm. 378-382 - Xuantong Dong, Zhijie Lin, Yuan Ren:
Identification of protein complexes algorithm based on random walk model. 383-388 - Wenhui Li, Feng Qu, Ying Wang, Peixun Liu:
A fast vehicle top-view system. 389-393 - Bin Shang, Shun Fang:
Cellular automata simulation of traffic spillback and queue-jumping behaviors at off-ramp on urban expressways in Shanghai. 394-399 - Lili Xie, Guolong Chen:
A forensics tool of Foxmail client. 400-405 - Shiwei Gao, Binglei Du, Yaruo Jiang, Jianghua Lv, Shilong Ma:
An efficient algorithm for pairwise test case generation in presence of constraints. 406-410 - Jerzy Jedrzejewski, Zbigniew Kowal, Wojciech Kwasny, Zdzislaw Winiarski:
In-house system for holistic modelling of machine tool operating properties. 411-416 - Sabah Al-Fedaghi, Noura Aljallal:
Multilevel semantic foundation for digital logic diagrams. 417-424 - Heng Liu, Ping Xi:
A mesh generation method for geometric features based on knowledge-based engineering. 425-430 - Peng Hu, Jianjing Shen, Linbo Tao:
Scenario-driven composition of context-aware simulation components. 431-435 - Sung J. Shim, Arun Kumar, Roger Jianxin Jiao:
A simulation study of RFID system for improving patient discharge process in a hospital. 436-440 - Cuihua Sun, Feng Wang, Yong Ge:
Design and implementation of the online map system based on LBS. 441-446 - Kai Shi, Zhanquan Wang, Fei Luo, Chunhua Gu:
Design and realization of general matrix keyboard based on STM32. 447-453 - Chongnan Wang, Zongtao Wang, Hongwei Xing:
Design of message-oriented middleware with publish/subscribe model on Telemetry and Command computer. 454-458 - Yunong Zhang, Weixiang Ding, Wenchao Lao, Ying Wang, Hongzhou Tan:
Restoration of missing time-series data via multiple sine functions decomposition with Guangzhou-temperature application. 459-464 - Ling-Hua Chang, Sanjiv Behl, Tung-Ho Shieh:
W-Revised: An amazing tool for creating customized websites. 465-470 - Tuan Son Nguyen, Tien Thanh Nguyen, Thi Thu Thuy Nguyen, Anh Hai Nguyen:
Application of digital technology in ballistic mortar for determining the power of high explosives. 471-476 - Caihong Wang, Jian Xu:
Delay-induced Hopf bifurcation in the double-link inverted pendulum system for human quiet standing. 477-481 - Satoshi Yamane, Takaya Shimizu:
Development of probabilistic timed CEGAR. 482-491 - A. F. M. Sultanul Kabir, Mollah Ahmed Shorif, Hua Li, Qian Yu:
A study of secured wireless sensor networks with XBee and Arduino. 492-496 - Wei-qing Huang, Chang Ding, Siye Wang, Xiang Jing, Yuan-Jian Luo, Yanfang Zhang, Zhujun Zhang:
An efficient visualization method of RFID indoor positioning data. 497-504 - Dapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang:
An energy efficient cluster-based routing protocol for intelligent environmental monitoring system. 505-509 - Dapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang:
LDDP: A location-based directed diffusion routing protocol for smart home sensor network. 510-514 - Wei Xiao, Jianfei Liu, Nan Jiang, Hongzhou Shi:
An optimization of the object function for routing protocol of low-power and Lossy networks. 515-519 - Rong Li, Ji Li:
A novel clouds based spectrum monitoring approach for future monitoring network. 520-524 - Jian Zhou, Lijuan Sun, Tianshi Liu, Tao Zhang, Fu Xiao:
An admission control scheme based on the game theory for LEO satellite networks. 525-530 - Peng Yang, Dou Liu, Yan Zhang:
Dynamical coding method for intermittent connectivity wireless network. 531-535 - Shuai Yang, Rongxi He, Ying Wang, Sen Li, Bin Lin:
OPNET-based modeling and simulations on routing protocols in VANETs with IEEE 802.11p. 536-541 - Wenhui Zhao, Yuhui Dong:
Closed-loop system of Cesium atomic magnetometer and its characteristics. 542-547 - Fei Xia, Zongze Xia, Xiaobo Huang, Xiao Gao:
A resource allocation approach via the genetic algorithms in electric power communication networks. 548-552 - Bo Yu, Lu-Yong Zhang:
An improved detection method for different types of jamming attacks in wireless networks. 553-558 - Quan-Quan Wang, Hong Bo Zhu, Ru-Shan Chen:
Computation of reflection and transmission coefficients of frequency selective surfaces using sub-entire-domain basis function method. 559-563 - Yalin Miao, Ying Liu, Longyan Wang:
Design and application of multi-channel data acquisition system based on short-range wireless communication technology. 564-569 - Xudong Fan, Hui Li:
Design and implementation of TCP with network coding. 570-575 - Wen-Cheng Lai, Jhin-Fang Huang, Pi-Gi Yang:
Design broad-band power amplifier and chip antenna with human body at intelligent computer and communications applications. 576-580 - Shuhui Jiang, Xi Shen, Yan Wang, Xiaofei Zhang, Dayong Liu:
Improved clustering and outlier detection based shortwave direction finding and crossing location algorithm. 581-585 - Muhammad Waqas Khan, Yimin Zhou, Guoqing Xu:
Modeling of acoustic propagation channel in underwater wireless sensor networks. 586-590 - Alahoum Fathi, Zhen Xu:
Performance analysis of rate compatible punctured turbo coded hybrid ARQ scheme over satellite channel. 591-596 - Min Jung Lee, Yong Won Kim, Sang-Lim Ju, Kyung-Seok Kim:
Performance comparison of spatial multiplexing multi-input multi-output systems in accordance with dimming control. 597-601 - Lan Mi Hwang, Yong-Won Kim, Byeong Gon Choi, Kyung-Seok Kim:
Performance of color shift keying-space time block code-orthogonal frequency division multiplexing system on visible light communication. 602-606 - Youfeng Wang, Xiuquan Qiao:
Design and implementation of web browser for named data networking in Windows. 607-612 - Keyu Lu, Kaikun Dong, Cuihua Wang, Haiyan Xu:
DNS configuration detection model. 613-618 - Zizhuo Zhang, Ruda Yang, Zhengqin Li, Liwei Chen, Xiaozhi Yu, Yeming Tang, Zhao Du:
Location-based social networking information services in university campus. 619-623 - Degang Sun, Jun Shi, Dong Wei, Meng Zhang:
A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction. 624-628 - Degang Sun, Wen Yang, Meng Zhang, Shaojian Huang:
Classified removable storage medium control based on the access control matrix. 629-633 - Xiaoqi Xiao, Xiaochen Lin, Yuan Li:
Joint remote state preparation of a qubit state via a W state using single-atom rotation operations. 634-638 - Yuan Li, Xiaoqi Xiao, Yu Yang, Shunru Ji:
Symmetric controlled quantum secret sharing scheme via stabilizer codes. 639-643 - Sai-Dan Zhang, Lu-Yong Zhang:
Vulnerability mining for network protocols based on fuzzing. 644-648 - Fengjiao Li, Luyong Zhang, Dianjun Chen:
Vulnerability mining of Cisco router based on fuzzing. 649-653